network security and firewalls

92
Network Security and Firewalls

Upload: melosa

Post on 10-Feb-2016

53 views

Category:

Documents


2 download

DESCRIPTION

Network Security and Firewalls. Lesson 1: What Is Security. Objectives. Define security Explain the need for network security Identify resources that need security Identify the two general security threat types List security standards and organizations. What Is Security?. LANs WANs VPNs - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Network Security and Firewalls

Network Securityand Firewalls

Page 2: Network Security and Firewalls

Lesson 1:What Is Security

Page 3: Network Security and Firewalls

Objectives

Define security

Explain the need for network security

Identify resources that need security

Identify the two general security threat types

List security standards and organizations

Page 4: Network Security and Firewalls

What Is Security?

LANs

WANs

VPNs

Network perimeters

Page 5: Network Security and Firewalls

Hacker Statistics

One of every five Internet sites has experienced a security breach

Losses due to security breaches are estimated at $10 billion each year

Intrusions have increased an estimated 50 percent in the past year

Page 6: Network Security and Firewalls

What Is the Risk?

Categorizing attacks

Countering attacks systematically

Page 7: Network Security and Firewalls

The Myth of 100-Percent Security

Security as balance

Security policies

Page 8: Network Security and Firewalls

Attributes of anEffective Security Matrix Allows access control

Easy to use

Appropriate cost of ownership

Flexible and scalable

Superior alarming and reporting

Page 9: Network Security and Firewalls

What You AreTrying to Protect

End user resources

Network resources

Server resources

Information storage resources

Page 10: Network Security and Firewalls

Who Is the Threat?

Casual attackers

Determined attackers

Spies

Page 11: Network Security and Firewalls

Security Standards

Security services- Authentication- Access control- Data confidentiality- Data integrity- Nonrepudiation

Security mechanisms- The Orange Book

Page 12: Network Security and Firewalls

Summary

Define security

Explain the need for network security

Identify resources that need security

Identify the two general security threat types

List security standards and organizations

Page 13: Network Security and Firewalls

Lesson 2:Elements of Security

Page 14: Network Security and Firewalls

Objectives

Formulate the basics of an effective security policy

Identify the key user authentication methods

Explain the need for access control methods

Describe the function of an access control list

Page 15: Network Security and Firewalls

Objectives (cont’d)

List the three main encryption methods used in internetworking

Explain the need for auditing

Page 16: Network Security and Firewalls

Elements of Security

Audit Administration

Encryption Access Control

User Authentication

Corporate Security Policy

Page 17: Network Security and Firewalls

The Security Policy

Classify systems Prioritize resources Assign risk factors Define acceptable and unacceptable

activities Define measures to apply to resources Define education standards Assign policy administration

Page 18: Network Security and Firewalls

Encryption

Encryption categories- Symmetric- Asymmetric- Hash

Encryption strength

Page 19: Network Security and Firewalls

Authentication

Authentication methods- Proving what you know- Showing what you have- Demonstrating who you are- Identifying where you are

Page 20: Network Security and Firewalls

SpecificAuthentication Techniques

Kerberos

One-time passwords

Page 21: Network Security and Firewalls

Access Control

Access Control List- Objects

Execution Control List- Sandboxing

Page 22: Network Security and Firewalls

Auditing

Passive auditing

Active auditing

Page 23: Network Security and Firewalls

Security Tradeoffsand Drawbacks

Increased complexity

Slower system response time

Page 24: Network Security and Firewalls

Summary

Formulate the basics of an effective security policy

Identify the key user authentication methods

Explain the need for access control methods

Describe the function of an access control list

Page 25: Network Security and Firewalls

Summary (cont’d)

List the three main encryption methods used in internetworking

Explain the need for auditing

Page 26: Network Security and Firewalls

Lesson 3:Applied

Encryption

Page 27: Network Security and Firewalls

Objectives

Create a trust relationship using public-key cryptography

List specific forms of symmetric, asymmetric, and hash encryption

Deploy PGP in Windows 2000 and Linux

Page 28: Network Security and Firewalls

Creating Trust Relationships

Manually

Automatically

Page 29: Network Security and Firewalls

Rounds, Parallelizationand Strong Encryption Round

- Discrete part of the encryption process

Parallelization- Use of multiple processes, processors

or machines to work on cracking one encryption algorithm

Strong encryption- Use of any key longer than 128 bits

Page 30: Network Security and Firewalls

Symmetric-KeyEncryption

One key is used to encrypt and decrypt messages

Page 31: Network Security and Firewalls

SymmetricAlgorithms

Data encryption standard

Triple DES

Symmetric algorithms created by the RSA Security Corporation

International Data Encryption Algorithm

Blowfish and Twofish

Skipjack

MARS

Rijndael and Serpent

Advanced Encryption Standard

Page 32: Network Security and Firewalls

Asymmetric Encryption

Asymmetric-key encryption elements- RSA- DSA- Diffie-Hellman

Page 33: Network Security and Firewalls

Hash Encryption

Signing

Hash algorithms- MD2, MD4, and MD5- Secure hash algorithm

Page 34: Network Security and Firewalls

AppliedEncryption Processes

E-mail

PGP and GPG

S-MIME

Encrypting drives

Web server encryption

Page 35: Network Security and Firewalls

Summary

Create a trust relationship using public-key cryptography

List specific forms of symmetric, asymmetric, and hash encryption

Deploy PGP in Windows 2000 and Linux

Page 36: Network Security and Firewalls

Lesson 4:Types

of Attacks

Page 37: Network Security and Firewalls

Objectives

Describe specific types of security attacks

Recognize specific attack incidents

Page 38: Network Security and Firewalls

Brute-Force andDictionary Attacks

Brute-force attack- Repeated access attempts

Dictionary attack- Customized version of brute-force

attack

Page 39: Network Security and Firewalls

System Bugs and Back Doors

Buffer overflow

Trojans and root kits

Page 40: Network Security and Firewalls

Social Engineeringand Nondirect Attacks Call and ask for the password

Fraudulent e-mail

DOS and DDOS attacks

Spoofing

Trojans

Information leakage

Hijacking and man-in-the-middle attacks

Page 41: Network Security and Firewalls

Summary

Describe specific types of security attacks

Recognize specific attack incidents

Page 42: Network Security and Firewalls

Lesson 5:General

Security Principles

Page 43: Network Security and Firewalls

Objectives

Describe the universal guidelines and principles for effective network security

Use universal guidelines to create effective specific solutions

Page 44: Network Security and Firewalls

CommonSecurity Principles

Be paranoid

Have a security policy

No system stands alone

Minimize the damage

Deploy companywide enforcement

Provide training

Integrate security strategies

Place equipment according to needs

Identify security business issues

Consider physical security

Page 45: Network Security and Firewalls

Summary

Describe the universal guidelines and principles for effective network security

Use universal guidelines to create effective specific solutions

Page 46: Network Security and Firewalls

Lesson 6:Protocol Layers

and Security

Page 47: Network Security and Firewalls

Objectives

List the protocols that pass through a firewall

Identify potential threats at different layers of the TCP/IP stack

Page 48: Network Security and Firewalls

TCP/IP andNetwork Security

The Internet and TCP/IP were not designed around strong security principles

Page 49: Network Security and Firewalls

The TCP/IP Suite andthe OSI Reference Model Physical layer

Network layer

Transport layer

Application layer

Presentation layer

Session layer

Data link layer

Page 50: Network Security and Firewalls

TCP/IPPacket Construction

TCP Segment

Header Body

IP Datagram

Header Body

Ethernet Frames

Application Message: e-mail, FTP, Telnet

Header Body Trailer

Page 51: Network Security and Firewalls

Summary

List the protocols that pass through a firewall

Identify potential threats at different layers of the TCP/IP stack

Page 52: Network Security and Firewalls

Lesson 7:Securing Resources

Page 53: Network Security and Firewalls

Objectives

Consistently apply security principles

Secure TCP/IP services

Describe the importance of testing and evaluating systems and services

Discuss network security management applications

Page 54: Network Security and Firewalls

Implementing Security

Categorize resources and needs

Define a security policy

Secure each resource and service

Log, test, and evaluate

Repeat the process and keep current

Page 55: Network Security and Firewalls

Resources and Services

Protecting services- Protect against profiling- Coordinate methods and techniques- Protect services by changing default

settings- Remove unnecessary services

Page 56: Network Security and Firewalls

ProtectingTCP/IP Services

The Web Server- CGI scripts- CGI and programming

Securing IIS

Additional HTTP servers

FTP servers- Access control

Page 57: Network Security and Firewalls

Simple MailTransfer Protocol

The Internet Worm

The Melissa virus

E-mail and virus scanning

Access control measures

Page 58: Network Security and Firewalls

Testing and Evaluating

Testing existing systems

Page 59: Network Security and Firewalls

Security Testing Software

Specific tools- Network scanners- Operating system add-ons- Logging and log analysis tools

Page 60: Network Security and Firewalls

Security and Repetition

Understanding the latest exploits

Page 61: Network Security and Firewalls

Summary

Consistently apply security principles

Secure TCP/IP services

Describe the importance of testing and evaluating systems and services

Discuss network security management applications

Page 62: Network Security and Firewalls

Lesson 8:Firewalls and

Virtual Private Networks

Page 63: Network Security and Firewalls

Objectives

Describe the role a firewall plays in a company’s security policy

Define common firewall terms

Describe packet-filtering rules

Describe circuit-level gateways

Configure an application-level gateway

Explain PKI

Discuss public keys and VPNs

Page 64: Network Security and Firewalls

The Roleof a Firewall

Implement a company’s security policy

Create a choke point

Log Internet activity

Limit network host exposure

Page 65: Network Security and Firewalls

FirewallTerminology

Packet filter

Proxy server

NAT

Bastion host

Operating system hardening

Screening and choke routers

DMZ

Page 66: Network Security and Firewalls

CreatingPacket Filter Rules

Process- Packet filters work at the network layer

of the OSI/RM

Rules and fields

Page 67: Network Security and Firewalls

Packet Filter Advantages and Disadvantages

Drawbacks

Stateful multi-layer inspection

Popular packet-filtering products

Using the ipchains and iptables commands in Linux

Page 68: Network Security and Firewalls

ConfiguringProxy Servers

Recommending a proxy-oriented firewall

Advantages and disadvantages- Authentication- Logging and alarming- Caching- Reverse proxies and proxy arrays- Client configuration- Speed

Page 69: Network Security and Firewalls

Remote Access andVirtual Private Networks Virtual network perimeter

Tunneling protocols

IPsec

ESP

PPTP

L2TP

Page 70: Network Security and Firewalls

Public KeyInfrastructure (PKI)

Standards- Based on X.509 standard

Terminology

Certificates

Page 71: Network Security and Firewalls

Summary

Describe the role a firewall plays in a company’s security policy

Define common firewall terms

Describe packet-filtering rules

Describe circuit-level gateways

Configure an application-level gateway

Explain PKI

Discuss public keys and VPNs

Page 72: Network Security and Firewalls

Lesson 9:Levels of

Firewall Protection

Page 73: Network Security and Firewalls

Objectives

Plan a firewall system that incorporates several levels of protection

Describe the four types of firewall systems design and their degrees of security

Implement a packet-filtering firewall

Page 74: Network Security and Firewalls

FirewallStrategies and Goals

Resource placement

Physical access points

Site administration

Monitoring tools

Hardware

Page 75: Network Security and Firewalls

Building a Firewall

Design principles- Keep design simple- Make contingency plans

Page 76: Network Security and Firewalls

Types ofBastion Hosts

Single-homed bastion host

Dual-homed bastion host

Single-purpose bastion hosts- Internal bastion hosts

Page 77: Network Security and Firewalls

Hardware Issues

Operating system

Services

Daemons

Page 78: Network Security and Firewalls

CommonFirewall Designs

Screening routers

Screened host firewall (single-homed bastion)

Screened host firewall (dual-homed bastion)

Screened subnet firewall (demilitarized zone)

Page 79: Network Security and Firewalls

Summary

Plan a firewall system that incorporates several levels of protection

Describe the four types of firewall systems design and their degrees of security

Implement a packet-filtering firewall

Page 80: Network Security and Firewalls

Lesson 10:Detecting and

Distracting Hackers

Page 81: Network Security and Firewalls

Objectives

Customize your network to manage hacker activity

Implement proactive detection

Distract hackers and contain their activity

Set traps

Deploy Tripwire for Linux

Page 82: Network Security and Firewalls

Proactive Detection

Automated security scans

Login scripts

Automated audit analysis

Checksum analysis

Page 83: Network Security and Firewalls

Distractingthe Hacker

Dummy accounts

Dummy files

Dummy password files

Tripwires and automated checksums

Jails

Page 84: Network Security and Firewalls

Punishingthe Hacker

Methods

Tools

Page 85: Network Security and Firewalls

Summary

Customize your network to manage hacker activity

Implement proactive detection

Distract hackers and contain their activity

Set traps

Deploy Tripwire for Linux

Page 86: Network Security and Firewalls

Lesson 11:Incident Response

Page 87: Network Security and Firewalls

Objectives

Respond appropriately to a security breach

Identify some of the security organizations that can help you in case your system is attacked

Subscribe to respected security alerting organizations

Page 88: Network Security and Firewalls

DecideAhead of Time

Itemize a detailed list of procedures

Include the list in a written policy

Be sure all employees have a copy

Page 89: Network Security and Firewalls

Incident Response

Do not panic

Document everything

Assess the situation

Stop or contain the activity

Execute the response plan

Analyze and learn

Page 90: Network Security and Firewalls

Summary

Respond appropriately to a security breach

Identify some of the security organizations that can help you in case your system is attacked

Subscribe to respected security alerting organizations

Page 91: Network Security and Firewalls

NetworkSecurity and FirewallsWhat Is Security?

Elements of Security

Applied Encryption

Types of Attacks

General Security Principles

Protocol Layers and Security

Page 92: Network Security and Firewalls

NetworkSecurity and FirewallsSecuring Resources

Firewalls and Virtual Private Networks

Levels of Firewall Protection

Detecting and Distracting Hackers

Incident Response